Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Identifying malicious Android apps using permissions and system events
Hongmu Han; Ruixuan Li; Xiwu Gu
International Journal of Embedded Systems (IJES), 2016 Vol.8 No.1, pp.46 - 58
12 + 5 =

Thank you for your feedback.